SlideShare a Scribd company logo
1 of 10
Download to read offline
Privacy Value Networks Project
• Research Project funded by
  TSB/EPSRC/ESRC, £2m, 09/08-08/11
  •   Oxford Internet Institute
  •   Bath University
  •   St Andrews University
  •   University College London
  •   Consult Hyperion
  •   BT
• http://www.pvnets.org/
Project Aims
• To account for value (and devalue) of data items
  from the perspective of all stakeholders
   • Company/government and customer/citizen
   • Secondary users (e.g. other family members,
     neighbours)
• To account for individual, commercial and
  societal costs and benefits
   • Immediate and long-term
• To model impact of data quality and transparency
Reality: Value and De-value
• Customers/citizens feel privacy is violated even
  when data is handled in accordance with DPA
• Take action to protect themselves, e.g.
   • Abandoning forms when phone number requested
   • False DOB on social networking sites
• Decreasing data quality
• Discrepancy between customer/citizen and
  “data shadow”
• Value networks – impact on 3rd parties?
Payment
                                                                    e ft
                                                         t it y t h        do                                                                      Third
                                                  Id e n           w hat I                       ID thief
                                                          am ,                                                                ID data
                                                 W ho I                                                                                           Parties
                                                                                          L im




                                                                                                      Brand damage
                      Facebook                            SN
                                                                                         i
                                                                                   S N te d
                                                                              se
                        User                          P e S e rv                 rv i
                                                          rs o           ic e         ce
                                     w it                       na
                                          hh            lo y        ld
                                             e ld                        a ta
                                                             a lt                                                                    e n ts
                                                  in f            y
Who I am, what I do




                                                                                                                             paym                        Advertisers
                           Who I am, what I do



                                                       o,
                                                          de                                                            CPM
                                                              ce                                                                  t is in g
                                                                   p ti                                                    A dver
                                                                        on
                                                                                         Facebook                                           r g e t in g
                                                                            ,P
                                                                               ET                                              io u ra l ta
                                                                                  s                                      Behav
                                                                                            Org                                                           A
                                                                                                                                               ased C P
                                                                 ni   ty                                                      C TR, incre
                                                              mu                                                     Reduced
                                                          m
                                                     Co
                                                                       a
                                                                 dat
                                                           S   N                                                                        Regulator
                                                                               v   ic e                Potential
                      Friends                                              Ser                                                                              Insurance
                                                                 SN                                    employer

                                                 Tangible Devalue                                                                                  Tangible Value
                                                 Knowledge Devalue                                                                                 Knowledge Value
                                                 Intangible Devalue                                                                                Intangible Value
Case studies
1. Biographical data (Identity and Passport Service)
2. Communications usage data on families and
   geographical groups (BT)
3. Sensor-enhanced Facebook (students and young
   professionals)
4. Longitudinal data families (MORI)
5. Financial data
6. HIV+ patient records
Mobile social sensing
Financial Services
• Methods #1 of 2
  • Interview financially excluded people
     • Seeking
        • Role of personal information and privacy in service uptake?
        • Value of protecting/ sharing personal financial info. w.r.t.
            • Other family members
            • Friends / neighbours / community
            • Service providers
        • Desired properties of services
     • Recruitment
        • Approaching voluntary credit support agencies (Citizens Advice,
          CCCS, etc.) to recruit for us, so
        • Trusted party engages the family member that deals with
          financial management, at the point of doing it
Financial Services
• Methods #2 of 2
  • Interview service providers
     • Seeking
        • What information is used to assess service provision risk?
        • What information would allow ‘better’ decisions?
        • How could existing information be better used to provide
          services the users want?
        • Values of personal information providers hold about customers
          w.r.t.
            • The customers
            • The providers themselves
            • Their competitors / other service providers
     • Recruitment
        • In talks with a high street bank
        • Looking for wider range of service providers
Conclusions
• Time to re-think approach to data collection,
  processing and retention
• Applying DPA, and beyond
   •   Consider value and de-value for all stakeholders
   •   Wider and long-term impacts for value networks
   •   Tool for impact modelling
   •   Can be used to facilitate Privacy Impact Assessments
       (PIA)
• Improved data quality will benefit all
  stakeholders

More Related Content

What's hot

Digital dealer magazine january 2009
Digital dealer magazine   january 2009Digital dealer magazine   january 2009
Digital dealer magazine january 2009Ralph Paglia
 
Fusion Marketing - It's What's Next
Fusion Marketing - It's What's NextFusion Marketing - It's What's Next
Fusion Marketing - It's What's NextMike Lewis
 
Business Acumen for Artists 2011 - Concretising your Project
Business Acumen for Artists 2011 - Concretising your ProjectBusiness Acumen for Artists 2011 - Concretising your Project
Business Acumen for Artists 2011 - Concretising your ProjectElaine Rumboll
 
Measuring Social Media
Measuring Social MediaMeasuring Social Media
Measuring Social MediaDave Evans
 
Map 5 - 6 for Mar Vista Green Garden Showcase
Map 5 - 6 for Mar Vista Green Garden ShowcaseMap 5 - 6 for Mar Vista Green Garden Showcase
Map 5 - 6 for Mar Vista Green Garden ShowcaseSherri Akers
 
Open Service Design at the SDC 2010
Open Service Design at the SDC 2010Open Service Design at the SDC 2010
Open Service Design at the SDC 2010Evangelina Guerra
 
jQuery Open Source Process (RIT 2011)
jQuery Open Source Process (RIT 2011)jQuery Open Source Process (RIT 2011)
jQuery Open Source Process (RIT 2011)jeresig
 
jQuery Open Source (Fronteer 2011)
jQuery Open Source (Fronteer 2011)jQuery Open Source (Fronteer 2011)
jQuery Open Source (Fronteer 2011)jeresig
 
Fringe eu procurement - sara piller
Fringe   eu procurement - sara pillerFringe   eu procurement - sara piller
Fringe eu procurement - sara pillerlgconf11
 
Winning & Losing By Design: Web & Mobile App Design To Make Or Break Your Bus...
Winning & Losing By Design: Web & Mobile App Design To Make Or Break Your Bus...Winning & Losing By Design: Web & Mobile App Design To Make Or Break Your Bus...
Winning & Losing By Design: Web & Mobile App Design To Make Or Break Your Bus...Fresh Tilled Soil
 
Data Driven Design Research Personas
Data Driven Design Research PersonasData Driven Design Research Personas
Data Driven Design Research PersonasTodd Zaki Warfel
 
Veyond Partners Introduction 200901
Veyond Partners Introduction 200901Veyond Partners Introduction 200901
Veyond Partners Introduction 200901Yunho Chung
 
5 Ways Every Non-profit Should Use the Internet
5 Ways Every Non-profit Should Use the Internet  5 Ways Every Non-profit Should Use the Internet
5 Ways Every Non-profit Should Use the Internet mpdean1
 
Ban ki moon nov-dec 2006
Ban ki moon   nov-dec 2006Ban ki moon   nov-dec 2006
Ban ki moon nov-dec 2006miscott57
 
Deisgn for an Exploding World
Deisgn for an Exploding WorldDeisgn for an Exploding World
Deisgn for an Exploding WorldMarisa Gallagher
 
1998AnnualReportcover auto nation
1998AnnualReportcover auto nation1998AnnualReportcover auto nation
1998AnnualReportcover auto nationfinance14
 
VDP & PSL -- all it can do to help grow your business
VDP & PSL -- all it can do to help grow your businessVDP & PSL -- all it can do to help grow your business
VDP & PSL -- all it can do to help grow your businessMarketingHighway
 
What do Technology Users think about JDF? (2005)
What do Technology Users think about JDF? (2005)What do Technology Users think about JDF? (2005)
What do Technology Users think about JDF? (2005)VIGCbe
 

What's hot (20)

Digital dealer magazine january 2009
Digital dealer magazine   january 2009Digital dealer magazine   january 2009
Digital dealer magazine january 2009
 
Fusion Marketing - It's What's Next
Fusion Marketing - It's What's NextFusion Marketing - It's What's Next
Fusion Marketing - It's What's Next
 
Business Acumen for Artists 2011 - Concretising your Project
Business Acumen for Artists 2011 - Concretising your ProjectBusiness Acumen for Artists 2011 - Concretising your Project
Business Acumen for Artists 2011 - Concretising your Project
 
Measuring Social Media
Measuring Social MediaMeasuring Social Media
Measuring Social Media
 
Map 5 - 6 for Mar Vista Green Garden Showcase
Map 5 - 6 for Mar Vista Green Garden ShowcaseMap 5 - 6 for Mar Vista Green Garden Showcase
Map 5 - 6 for Mar Vista Green Garden Showcase
 
Open Service Design at the SDC 2010
Open Service Design at the SDC 2010Open Service Design at the SDC 2010
Open Service Design at the SDC 2010
 
jQuery Open Source Process (RIT 2011)
jQuery Open Source Process (RIT 2011)jQuery Open Source Process (RIT 2011)
jQuery Open Source Process (RIT 2011)
 
jQuery Open Source (Fronteer 2011)
jQuery Open Source (Fronteer 2011)jQuery Open Source (Fronteer 2011)
jQuery Open Source (Fronteer 2011)
 
Fringe eu procurement - sara piller
Fringe   eu procurement - sara pillerFringe   eu procurement - sara piller
Fringe eu procurement - sara piller
 
Winning & Losing By Design: Web & Mobile App Design To Make Or Break Your Bus...
Winning & Losing By Design: Web & Mobile App Design To Make Or Break Your Bus...Winning & Losing By Design: Web & Mobile App Design To Make Or Break Your Bus...
Winning & Losing By Design: Web & Mobile App Design To Make Or Break Your Bus...
 
Data Driven Design Research Personas
Data Driven Design Research PersonasData Driven Design Research Personas
Data Driven Design Research Personas
 
Veyond Partners Introduction 200901
Veyond Partners Introduction 200901Veyond Partners Introduction 200901
Veyond Partners Introduction 200901
 
Smoking
SmokingSmoking
Smoking
 
5 Ways Every Non-profit Should Use the Internet
5 Ways Every Non-profit Should Use the Internet  5 Ways Every Non-profit Should Use the Internet
5 Ways Every Non-profit Should Use the Internet
 
Ban ki moon nov-dec 2006
Ban ki moon   nov-dec 2006Ban ki moon   nov-dec 2006
Ban ki moon nov-dec 2006
 
Deisgn for an Exploding World
Deisgn for an Exploding WorldDeisgn for an Exploding World
Deisgn for an Exploding World
 
1998AnnualReportcover auto nation
1998AnnualReportcover auto nation1998AnnualReportcover auto nation
1998AnnualReportcover auto nation
 
Resume Draft
Resume DraftResume Draft
Resume Draft
 
VDP & PSL -- all it can do to help grow your business
VDP & PSL -- all it can do to help grow your businessVDP & PSL -- all it can do to help grow your business
VDP & PSL -- all it can do to help grow your business
 
What do Technology Users think about JDF? (2005)
What do Technology Users think about JDF? (2005)What do Technology Users think about JDF? (2005)
What do Technology Users think about JDF? (2005)
 

Viewers also liked

Securing the Information Society
Securing the Information SocietySecuring the Information Society
Securing the Information Societyblogzilla
 
The Cassandra Platform - Christos Diou
The Cassandra Platform - Christos Diou The Cassandra Platform - Christos Diou
The Cassandra Platform - Christos Diou Cassandra Project
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
Changing behaviour to reduce energy demand
Changing behaviour to reduce energy demandChanging behaviour to reduce energy demand
Changing behaviour to reduce energy demandblogzilla
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?blogzilla
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
“ The Future of E-Commerce in Bangladesh” 2015 Premier University,Chittagong
“ The Future of E-Commerce in Bangladesh” 2015 Premier University,Chittagong“ The Future of E-Commerce in Bangladesh” 2015 Premier University,Chittagong
“ The Future of E-Commerce in Bangladesh” 2015 Premier University,ChittagongAriful Saimon
 

Viewers also liked (11)

Securing the Information Society
Securing the Information SocietySecuring the Information Society
Securing the Information Society
 
The Cassandra Platform - Christos Diou
The Cassandra Platform - Christos Diou The Cassandra Platform - Christos Diou
The Cassandra Platform - Christos Diou
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Changing behaviour to reduce energy demand
Changing behaviour to reduce energy demandChanging behaviour to reduce energy demand
Changing behaviour to reduce energy demand
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
“ The Future of E-Commerce in Bangladesh” 2015 Premier University,Chittagong
“ The Future of E-Commerce in Bangladesh” 2015 Premier University,Chittagong“ The Future of E-Commerce in Bangladesh” 2015 Premier University,Chittagong
“ The Future of E-Commerce in Bangladesh” 2015 Premier University,Chittagong
 

Similar to Privacy Value Networks

Collec+Ive Master
Collec+Ive MasterCollec+Ive Master
Collec+Ive Masterproducer
 
Tpn guideline
Tpn guidelineTpn guideline
Tpn guidelinesoftmail
 
Adding,subtracting,multiplying and dividing fractions
Adding,subtracting,multiplying and dividing fractionsAdding,subtracting,multiplying and dividing fractions
Adding,subtracting,multiplying and dividing fractionsgrade5a
 
Ormita recovering-lost-value
Ormita recovering-lost-valueOrmita recovering-lost-value
Ormita recovering-lost-valueOrmita Hong Kong
 
ete2009-jquery-success-ete-1
ete2009-jquery-success-ete-1ete2009-jquery-success-ete-1
ete2009-jquery-success-ete-1tutorialsruby
 
Learn Tech Services Quick View
Learn Tech Services Quick ViewLearn Tech Services Quick View
Learn Tech Services Quick ViewAman Deep Dubey
 
Reinventing Experience - Fabio Carnevale Maffè
Reinventing Experience - Fabio Carnevale MaffèReinventing Experience - Fabio Carnevale Maffè
Reinventing Experience - Fabio Carnevale MaffèCultura Digitale
 
ete2009-jquery-success-ete-1
ete2009-jquery-success-ete-1ete2009-jquery-success-ete-1
ete2009-jquery-success-ete-1tutorialsruby
 
jQuery Keynote 2011: Boston
jQuery Keynote 2011: BostonjQuery Keynote 2011: Boston
jQuery Keynote 2011: Bostonjeresig
 
Causes of WWII Timeline
Causes of WWII TimelineCauses of WWII Timeline
Causes of WWII TimelineKatey Snihur
 
Resumup: Ashton Kutcher
Resumup: Ashton KutcherResumup: Ashton Kutcher
Resumup: Ashton KutcherResumUP
 
JESS3 Portfolio
JESS3 PortfolioJESS3 Portfolio
JESS3 PortfolioJESS3
 
jQuery Open Source Process (Knight Foundation 2011)
jQuery Open Source Process (Knight Foundation 2011)jQuery Open Source Process (Knight Foundation 2011)
jQuery Open Source Process (Knight Foundation 2011)jeresig
 

Similar to Privacy Value Networks (20)

Collec+Ive Master
Collec+Ive MasterCollec+Ive Master
Collec+Ive Master
 
Soffer CollectIve Master
Soffer CollectIve MasterSoffer CollectIve Master
Soffer CollectIve Master
 
Tpn guideline
Tpn guidelineTpn guideline
Tpn guideline
 
Tpn guideline
Tpn guidelineTpn guideline
Tpn guideline
 
Adding,subtracting,multiplying and dividing fractions
Adding,subtracting,multiplying and dividing fractionsAdding,subtracting,multiplying and dividing fractions
Adding,subtracting,multiplying and dividing fractions
 
New ppt Solution Unlimited
New ppt Solution UnlimitedNew ppt Solution Unlimited
New ppt Solution Unlimited
 
Ormita recovering-lost-value
Ormita recovering-lost-valueOrmita recovering-lost-value
Ormita recovering-lost-value
 
ete2009-jquery-success-ete-1
ete2009-jquery-success-ete-1ete2009-jquery-success-ete-1
ete2009-jquery-success-ete-1
 
Learn Tech Services Quick View
Learn Tech Services Quick ViewLearn Tech Services Quick View
Learn Tech Services Quick View
 
Reinventing Experience - Fabio Carnevale Maffè
Reinventing Experience - Fabio Carnevale MaffèReinventing Experience - Fabio Carnevale Maffè
Reinventing Experience - Fabio Carnevale Maffè
 
ete2009-jquery-success-ete-1
ete2009-jquery-success-ete-1ete2009-jquery-success-ete-1
ete2009-jquery-success-ete-1
 
DesignS Brand Concept
DesignS Brand ConceptDesignS Brand Concept
DesignS Brand Concept
 
jQuery Keynote 2011: Boston
jQuery Keynote 2011: BostonjQuery Keynote 2011: Boston
jQuery Keynote 2011: Boston
 
Causes of WWII Timeline
Causes of WWII TimelineCauses of WWII Timeline
Causes of WWII Timeline
 
Resumup: Ashton Kutcher
Resumup: Ashton KutcherResumup: Ashton Kutcher
Resumup: Ashton Kutcher
 
GMA IV_Jegede
GMA IV_JegedeGMA IV_Jegede
GMA IV_Jegede
 
JESS3 Deck Jan10
JESS3 Deck Jan10JESS3 Deck Jan10
JESS3 Deck Jan10
 
JESS3 Portfolio
JESS3 PortfolioJESS3 Portfolio
JESS3 Portfolio
 
Open Source Process: jQuery by John Resig
Open Source Process: jQuery by John ResigOpen Source Process: jQuery by John Resig
Open Source Process: jQuery by John Resig
 
jQuery Open Source Process (Knight Foundation 2011)
jQuery Open Source Process (Knight Foundation 2011)jQuery Open Source Process (Knight Foundation 2011)
jQuery Open Source Process (Knight Foundation 2011)
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloudblogzilla
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
Regulating code
Regulating codeRegulating code
Regulating codeblogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Regulating code
Regulating codeRegulating code
Regulating code
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Privacy Value Networks

  • 1. Privacy Value Networks Project • Research Project funded by TSB/EPSRC/ESRC, £2m, 09/08-08/11 • Oxford Internet Institute • Bath University • St Andrews University • University College London • Consult Hyperion • BT • http://www.pvnets.org/
  • 2. Project Aims • To account for value (and devalue) of data items from the perspective of all stakeholders • Company/government and customer/citizen • Secondary users (e.g. other family members, neighbours) • To account for individual, commercial and societal costs and benefits • Immediate and long-term • To model impact of data quality and transparency
  • 3. Reality: Value and De-value • Customers/citizens feel privacy is violated even when data is handled in accordance with DPA • Take action to protect themselves, e.g. • Abandoning forms when phone number requested • False DOB on social networking sites • Decreasing data quality • Discrepancy between customer/citizen and “data shadow” • Value networks – impact on 3rd parties?
  • 4. Payment e ft t it y t h do Third Id e n w hat I ID thief am , ID data W ho I Parties L im Brand damage Facebook SN i S N te d se User P e S e rv rv i rs o ic e ce w it na hh lo y ld e ld a ta a lt e n ts in f y Who I am, what I do paym Advertisers Who I am, what I do o, de CPM ce t is in g p ti A dver on Facebook r g e t in g ,P ET io u ra l ta s Behav Org A ased C P ni ty C TR, incre mu Reduced m Co a dat S N Regulator v ic e Potential Friends Ser Insurance SN employer Tangible Devalue Tangible Value Knowledge Devalue Knowledge Value Intangible Devalue Intangible Value
  • 5. Case studies 1. Biographical data (Identity and Passport Service) 2. Communications usage data on families and geographical groups (BT) 3. Sensor-enhanced Facebook (students and young professionals) 4. Longitudinal data families (MORI) 5. Financial data 6. HIV+ patient records
  • 6.
  • 8. Financial Services • Methods #1 of 2 • Interview financially excluded people • Seeking • Role of personal information and privacy in service uptake? • Value of protecting/ sharing personal financial info. w.r.t. • Other family members • Friends / neighbours / community • Service providers • Desired properties of services • Recruitment • Approaching voluntary credit support agencies (Citizens Advice, CCCS, etc.) to recruit for us, so • Trusted party engages the family member that deals with financial management, at the point of doing it
  • 9. Financial Services • Methods #2 of 2 • Interview service providers • Seeking • What information is used to assess service provision risk? • What information would allow ‘better’ decisions? • How could existing information be better used to provide services the users want? • Values of personal information providers hold about customers w.r.t. • The customers • The providers themselves • Their competitors / other service providers • Recruitment • In talks with a high street bank • Looking for wider range of service providers
  • 10. Conclusions • Time to re-think approach to data collection, processing and retention • Applying DPA, and beyond • Consider value and de-value for all stakeholders • Wider and long-term impacts for value networks • Tool for impact modelling • Can be used to facilitate Privacy Impact Assessments (PIA) • Improved data quality will benefit all stakeholders